Introduction
WordPress is a very robust content-management system (CMS) that is free and open source. Because anyone can comment, create an account, and post on WordPress, many malicious actors have created networks of bots and servers that compromise and spam WordPress sites through brute-force attacks. The tool Fail2ban is useful in preventing unauthorized access to both your Droplet and your WordPress site. It notes suspicious or repeated login failures and proactively bans those IPs by modifying firewall rules for your Droplet.
In this guide, we will be using version 0.9.3 of Fail2ban on an Ubuntu 14.04 LAMP server, and integrating it with WordPress by using a spam log plugin.
Prerequisites
To complete this guide, you need
- One Ubuntu 14.04 Droplet using the one-click WordPress instance or your own WordPress Droplet
- A non-root user configured with sudo privileges for administrative tasks. You can learn how to set this up by following our Ubuntu 14.04 initial server setup guide.
- Set up and configure Fail2ban by following this How To Install and Use Fail2ban on Ubuntu 14.04 tutorial.
- Follow the guide on How To Configure Secure Updates and Installations in WordPress on Ubuntu
Step 1 – Installing the WordPress Fail2ban Plugin
First, log in to your WordPress site by visiting https://your_server_ip/wp-admin
in your browser and using the admin credentials you created while installing WordPress. Once logged in, you will see the following screen, which is your WordPress dashboard.
Look to the left sidebar for the word Plugins, which will appear about halfway down the sidebar. After clicking Plugins, you will see this screen:
Near the top, in the right section, you can click on Add New. This allows you to add new plugins to your WordPress site that can customize, secure, or extend your site. In this case, we will be searching for the Fail2ban plugin. The next screen will appear like this:
Enter Fail2ban in the search field, and press ENTER
on your keyboard. The results should return a screen that shows a few plugins, with the one to install being WP fail2ban.
Click Install Now to start the installation, where you will see two prompts: Activate Plugin and Return to Plugin Installer. Choose to Activate Plugin, and your browser will return you to the list of installed plugins, with the new WP fail2ban plugin in the list. At this time, you can click View details to see more information about your new plugin. There is also a FAQ that will help you understand how to enable features, like blocking of specific users that may be used to spam your WordPress site with content or comments.
Step 2 — Applying the WordPress Filter to Fail2ban
This WordPress plugin includes a new custom Fail2ban filter. In this step, we will install that filter so Fail2ban can correctly parse and use the authentication logs being sent to the syslog.
First, move the filter from the WordPress plugin directory to the appropriate Fail2ban filter location:
- sudo cp /var/www/html/wp-content/plugins/wp-fail2ban/wordpress.conf /etc/fail2ban/filter.d/
With your new wordpress.conf
filter in place, you can point Fail2ban to the appropriate authentication log by editing the file /etc/fail2ban/jail.local
. A jail in Fail2ban refers to a series of rules and actions that provide the filters for IP addresses.
Open the file jail.local
using nano or your favorite text editor.
- sudo nano /etc/fail2ban/jail.local
Once the file is open, scroll to the bottom and append the following lines to the end. These lines enable the plugin, set the filter to the wordpress.conf
filter we previously copied over to the filters.d
directory, set the appropriate logging destination for the access attempts, and specify that this traffic will come in on http
and https
ports.
[wordpress]
enabled = true
filter = wordpress
logpath = /var/log/auth.log
port = http,https
Save and close the file.
Next, you can restart Fail2ban to ensure the new filter is now in place by running this command in your terminal:
- sudo service fail2ban restart
Step 3 – Ignoring Login Attempts From Your Computer
In order to prevent you or other known users from being banned through accidental authentication failures, we recommend ignoring your own local computer’s public IP address.
If you are using a Linux-based OS, use this command:
curl ipecho.net/plain ; echo
Otherwise, visit https://checkip.dyndns.org
to determine your computer’s public IP address. If there are any other users of your WordPress site in alternate locations, you may want to find their addresses too.
Open jail.local
for editing again:
- sudo nano /etc/fail2ban/jail.local
The following line will list off any ignored IP addresses starting with the local server IP (localhost) with a space separating each other value for known hosts that you would like to have access to WordPress. Add this to DEFAULT section, under the ignoreip statement you added during the WordPress plugin setup steps.
ignoreip = 127.0.0.1/8 your_computer_ip
Save and exit your editor.
Step 4 – Testing the Filter
To test if the filter is working, you can log out of your WordPress site’s wp-admin site and log in again.
You can use this Fail2ban jail status to ensure that your successful login was not noted by the filter.
- sudo fail2ban-client status wordpress
You should see results similar to this:
Status for the jail: wordpress
|- filter
| |- File list: /var/log/auth.log
| |- Currently failed: 0
| `- Total failed: 0
`- action
|- Currently banned: 0
| `- IP list:
`- Total banned: 0
If you view the auth.log
file, you will see your successful login near the bottom of the file by using tail
which will show the last 10 lines of output:
- sudo tail /var/log/auth.log
The successful authentication will appear like this:
Month Day Hour:Minute:Second your_server wordpress(your_server_ip)[PID]: Accepted password for admin from your_computer_ip
If an unauthorized user or failed authentication appears in the logs, your new plugin will ensure that this IP is blocked from accessing your site by altering your firewall rules appropriately.
Step 5 – Rotating Your Log Files
If you find your WordPress site is getting a very large amount of unauthorized login attempts and your log file is growing rapidly, you can rotate the log file out for a new one by editing the file /etc/logrotate.conf
.
- sudo nano /etc/logrotate.conf
Append these lines, which set the maximum size of the file, the permissions for the log, and the number of weeks. For example, you can set 4 as number of weeks the file will exist for before being refreshed:
/var/log/auth.log {
size 30k
create 0600 root root
rotate 4
}
Save and exit the file appropriately.
Conclusion
By following the steps in this guide, you installed and configured the Fail2ban plugin, excluded your local IP address, and tested your work. You also set up log rotation to keep your log files from growing indefinitely. Now your WordPress instance is much more robust and secure against unauthorized login attempts, comment spam, and intrusion on your site.